Lucene search

K
mozillaMozilla FoundationMFSA2010-37
HistoryJul 20, 2010 - 12:00 a.m.

Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability — Mozilla

2010-07-2000:00:00
Mozilla Foundation
www.mozilla.org
72

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.742 High

EPSS

Percentile

98.1%

Security researcher J23 reported via TippingPoint’s Zero Day Initiative an error in the code used to store the names and values of plugin parameter elements. A malicious page could embed plugin content containing a very large number of parameter elements which would cause an overflow in the integer value counting them. This integer is later used in allocating a memory buffer used to store the plugin parameters. Under such conditions, too small a buffer would be created and attacker-controlled data could be written past the end of the buffer, potentially resulting in code execution.

CPENameOperatorVersion
firefoxlt3.5.11
firefoxlt3.6.7
seamonkeylt2.0.6

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.742 High

EPSS

Percentile

98.1%